IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 115 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, ICM, CQ, NV
(Joint)
2019-11-21
10:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Visual Analytics for Anomaly Classification in LAN Based on Deep Convolutional Neural Network
Yuwei Sun, Hideya Ochiai, Hiroshi Esaki (UTokyo) NS2019-121
Recently, the attack monitored in Local Area Network (LAN) is surging. There are some methods being used to analyze the ... [more] NS2019-121
pp.7-12
QIT
(2nd)
2019-11-19
14:50
Tokyo Gakushuin University Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
Seunghoan Song, Masahito Hayashi (Nagoya Univ.)
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more]
HWS, VLD 2019-03-01
16:45
Okinawa Okinawa Ken Seinen Kaikan A Counter Synchronization Method for MAC generation in CAN Communication
Kanata Nishida, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-135 HWS2018-98
The control of the automobile is realized by ECU. CAN is widely used as a network connecting the ECU. However, since CAN... [more] VLD2018-135 HWS2018-98
pp.249-254
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
16:00
Hokkaido Hokkaido Univ. [Invited Talk] Anomaly Detection for Smart Home Based on User Behavior -- ICCE2019 Report --
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric)
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more]

IA 2018-11-28
16:05
Tokyo Akihabara Convention Hall, 5th Floor (Conference Room 5B) Scalable ARP Snooping Using Policy Based Mirroring of Core Switches
Motoyuki Ohmori, Naoki Miyata (Tottori Univ.) IA2018-39
In order to handle a computer security incident or network failure, it is important to grasp a list of pairs of IP addre... [more] IA2018-39
pp.23-27
ICSS 2018-11-22
11:15
Kagoshima   [Invited Talk] An Overview of Cyber Security for Connected Vehicles
Junko Takahashi (NTT) ICSS2018-63
This paper presents an overview of cyber security for connected vehicles based on the recent previous studies of vehicle... [more] ICSS2018-63
pp.55-59
HWS, ICD 2018-10-29
16:50
Osaka Kobe Univ. Umeda Intelligent Laboratory Security Evaluations of Automotive Attacks on FlexRay
Junko Takahashi, Masashi Tanaka (NTT) HWS2018-55 ICD2018-47
This paper investigates a difficulty and a threat of previous attacks on FlexRay and reports that abnormal vehicle behav... [more] HWS2018-55 ICD2018-47
pp.47-52
IN, NS, CS, NV
(Joint)
2018-09-07
10:45
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study of Scanning Hosts Classification Mechanism in IP Backbone Networks
Yukihiro Togari, Hisashi Kojima, Takeshi Kuwahara (NTT) NS2018-102
We have researched a lightweight scan detection mechanism in the IP backbone networks. However, the existing mechanism c... [more] NS2018-102
pp.83-88
NS 2018-05-17
10:00
Kanagawa Yokohama City Education Center Hierarchical Role-based Network Access Control using Software-Defined Networking
Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] NS2018-15
pp.1-6
IA, IN
(Joint)
2017-12-14
16:45
Hiroshima Hiroshima City Univ. Anomaly Detection for Smart Home IoT based on Users' Behavior
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] IN2017-58
pp.73-78
ICSS 2017-11-21
09:55
Oita Beppu International Convention Center A Study on the Security of Dynamic Multi-Cast Key Distribution Protocol After Static Secret Keys Revealed
Masahiro Matsui, Yuki Okano, Reo Yoshida, Tetsutaro Kobayashi (NTT) ICSS2017-43
The security that an adversary can not guess the exchanged key after static secret key leaking is called Post Compromise... [more] ICSS2017-43
pp.29-34
IT 2017-09-08
13:00
Yamaguchi Centcore Yamaguchi Hotel [Invited Talk] Broadcast Encryption with Information Theoretic Security -- Classical Results and Recent Progress --
Yohei Watanabe (UEC) IT2017-44
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] IT2017-44
pp.31-36
IA 2017-08-28
14:35
Tokyo IIJ Seminar Room Survey of IPv6 transition technologies for security analysis
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-15
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, the transition ... [more] IA2017-15
pp.19-24
IA, SITE, IPSJ-IOT [detail] 2017-03-03
14:50
Okinawa Culture Resort Festone (Okinawa) Network based detection of Remote Access Trojan communication by using packet entropy on early instruction stage
Masumi Uno (NAIST), Masahiro Ishii (Tokyo Tech), Atsuo Inomata (TDU), Ismail Arai, Kazutoshi Fujikawa (NAIST) SITE2016-68 IA2016-98
Confidential information have been leaked accidentally by targetted attacks by targeted attacks.
Remote Access Trojan/t... [more]
SITE2016-68 IA2016-98
pp.41-46
ICSS, IA 2016-06-06
15:40
Saga Saga University Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN
Nariaki Tamaki, Takehiro Kawata (NTT) IA2016-4 ICSS2016-4
We propose the countermeasure technique to prevent key decipher, and improve the key-exchange protocol of IEEE 802.11 Wi... [more] IA2016-4 ICSS2016-4
pp.19-24
CPSY, DC, IPSJ-ARC [detail] 2016-05-09
14:10
Toyama Unaduki Suginoi Hotel A Study of Contact Avoidance Routing in Delay Tolerant Networks
Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-3 DC2016-3
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptogra... [more] CPSY2016-3 DC2016-3
pp.11-14
IA, SITE, IPSJ-IOT [detail] 2016-03-03
13:00
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services
Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] SITE2015-58 IA2015-90
pp.55-60
IN, IA
(Joint)
2015-12-17
16:10
Hiroshima Hiroshima City University Neighbor-Disjoint Multi-Route Avoidance Routing
Tetsuya Kanachi, Hiroaki Higaki (Tokyo Denki Univ.) IN2015-79
This paper proposes a novel routing protocol called neighbor-disjoint routing protocol in wireless multihop networks for... [more] IN2015-79
pp.49-54
QIT
(2nd)
2015-11-25
15:00
Kanagawa NTT Atsugi R&D center Robust Decoy State Generation with a Nested Modulator
Kensuke Nakata, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.)
In decoy-BB84 quantum key distribution (QKD) protocol, intensity fluctuation of the transmitted optical pulses reduce se... [more]
LOIS, ISEC, SITE 2015-11-06
16:20
Kanagawa Kanagawa Univ. A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] ISEC2015-46 SITE2015-33 LOIS2015-40
pp.67-74
 Results 21 - 40 of 115 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan